Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Visibility to possible sensitive data that we may not require. #29

Open
cwebster61083 opened this issue Jan 7, 2021 · 5 comments
Open
Labels
enhancement New feature or request

Comments

@cwebster61083
Copy link

One example of would be ssl private keys stored in /var/pesupport/master.puppetdebug.vlan/etc/puppet/ssl/private_keys. Another example would be eyaml keys if present.

@cwebster61083 cwebster61083 changed the title We have visibility to possible sensitive data that we may not requrie. Visibility to possible sensitive data that we may not require. Jan 7, 2021
@jarretlavallee jarretlavallee added the enhancement New feature or request label Jan 7, 2021
@MartyEwings
Copy link
Collaborator

MartyEwings commented Jan 8, 2021

@dylanratcliffe this had not occurred to me before, I'm not too worried about the SSL stuff, i don't think our customers would mind that too much, but things like EYAML keys could be a bone of contention, thoughts on this based on your field experience?

@dylanratcliffe
Copy link
Contributor

Yeah there's a good chance that people would be storing their private keys in /etc/puppetlabs and it could be an objection. Would be good to see if there is an easy way to exclude access to these...

@jarretlavallee
Copy link
Contributor

There could also be some concerns about sensitive data in some of the non-puppet logs in /var/log.

@Serviceguru
Copy link

I'd like to avoid any chance we can see private keys or any other content that is too risky and unnecessary to even access. Same as above re: non-puppet logs. In the event the customer experienced a breach, we must avoid even a chance of being a "suspect" because we have access.
Thanks

@MartyEwings
Copy link
Collaborator

MartyEwings commented Jan 13, 2021

The option to Narrow the feild to /<etc/opt/var>/puppetlabs is a possibility.

The idea there may be non puppet logs in /var/ is a potential, but at the same time we recommend nothing runs on infra other than puppet, at most sometimes there are splunk, zabbix and other monitoring tools running

I think we move forward as is, have this as a discussion topic, and potentially tighten the mount points, or make them dynamic, IE allow the customer to specifically input the mount locations, or leave as default as our alpha customers feedback

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

5 participants